German law enforcement officials have taken a significant step in holding cybercriminals accountable by publicly identifying two Russian nationals, Daniil Shchukin (also known as 'UNKN') and Anatoly Kravchuk, as key operatives within the infamous GandCrab and REvil (Sodinokibi) ransomware syndicates. The suspects are wanted in connection with a series of attacks that extorted millions and caused tens of millions of dollars in damages. This action is part of a coordinated European initiative aimed at disrupting Russian-based cybercrime operations. Although the REvil group was officially taken down in 2021, this development underscores that efforts to pursue its members are ongoing, even as challenges remain in bringing them to justice due to their suspected location in Russia.
GandCrab and its successor, REvil, were two of the most prolific and destructive ransomware-as-a-service (RaaS) operations in history. They pioneered the double extortion tactic, which involves not only encrypting victim data but also exfiltrating it and threatening to leak it publicly if the ransom is not paid (T1486 - Data Encrypted for Impact and T1041 - Data Exfiltration Over C2 Channel).
The identification of Shchukin and Kravchuk links specific individuals to these widespread criminal campaigns. They are accused of participating in at least 24 attacks, resulting in $2.3 million in direct extortion payments and an estimated $40 million in total damages, highlighting the significant economic impact of their activities.
The TTPs of GandCrab and REvil were well-documented and evolved over time. Common techniques included:
T1190 - Exploit Public-Facing Application), and also through large-scale phishing campaigns (T1566 - Phishing).T1003 - OS Credential Dumping).T1021.001 - Remote Services: Remote Desktop Protocol).T1490 - Inhibit System Recovery) to increase pressure on the victim to pay.The impact of these ransomware groups was global and devastating.
The public identification of suspects, while largely symbolic without an arrest, serves to disrupt their operations, apply pressure, and signal a commitment from law enforcement to pursue these actors.
No specific IOCs related to the 24 attacks were provided in the source articles.
Detection Strategies:
vssadmin), and the execution of suspicious commands. This is a core part of Process Analysis (D3-PA).Aggressively patch vulnerabilities in internet-facing systems to prevent the initial access vectors commonly used by these groups.
Mapped D3FEND Techniques:
Maintain offline, immutable backups to ensure recovery capabilities without paying the ransom.
Segment networks to contain ransomware spread and protect critical assets.
Mapped D3FEND Techniques:
Strictly control and monitor the use of privileged accounts to prevent lateral movement and widespread encryption.
Mapped D3FEND Techniques:
The primary initial access vector for ransomware groups like REvil and GandCrab was the exploitation of known vulnerabilities in internet-facing systems. Therefore, the most effective countermeasure is a rigorous and timely Software Update program. Organizations must have a comprehensive asset inventory to know what systems are exposed to the internet (e.g., VPNs, RDP gateways, web servers). A vulnerability management program must be in place to continuously scan these assets for new vulnerabilities. When a critical patch is released by a vendor, it must be treated as an emergency and deployed within hours or days, not weeks or months. Prioritize patching based on exposure and criticality. This proactive 'shield's up' posture hardens the perimeter and denies attackers the low-hanging fruit they rely on to get into a network, forcing them to use more difficult and easier-to-detect methods like phishing.
To neutralize the 'impact' portion of a ransomware attack, a robust Data Backup strategy is non-negotiable. This goes beyond simple backups. Organizations must follow the 3-2-1 rule: three copies of data, on two different media, with one copy off-site and offline or immutable. 'Immutable' is the key concept here. By using cloud storage with object lock or on-premises solutions that create write-once-read-many (WORM) backups, organizations can ensure that even if an attacker gains administrative control of the network, they cannot delete or encrypt the backup data. This is crucial because a primary TTP of REvil was to actively seek out and destroy backups. Regularly testing the restoration process is also critical to ensure the backups are viable. A successful backup strategy removes the attacker's primary leverage (data unavailability) and allows the organization to restore operations without paying the ransom.
Detecting and preventing OS Credential Dumping is key to stopping lateral movement. REvil and other groups heavily rely on tools like Mimikatz to extract credentials from memory, particularly from the LSASS process. Modern EDR solutions and Windows Defender itself have specific protections against this. Ensure that Attack Surface Reduction (ASR) rules are enabled, specifically the rule 'Block credential stealing from the Windows local security authority subsystem (lsass.exe)'. Additionally, monitor for any process attempting to open a handle to lsass.exe with PROCESS_VM_READ rights, as this is a strong indicator of a credential dumping attempt. Alerting on this behavior allows security teams to intervene early in the attack lifecycle, isolating the compromised host before the attacker can use the stolen credentials to move laterally and deploy ransomware across the entire network.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats